Shweta Shinde Profile
Shweta Shinde

@shw3ta_shinde

Followers
1K
Following
548
Media
5
Statuses
125

Assistant Professor at ETH Zurich @CSatETH, Security Researcher. @[email protected]

Zurich, Switzerland
Joined September 2010
Don't wanna be here? Send us removal request.
@shw3ta_shinde
Shweta Shinde
1 month
🚨Breaking AMD’s Confidential Computing (again!) — Meet RMPocalypse 🚨 Thrilled to share our 2nd paper at @acm_ccs 🎉 We break AMD SEV-SNP’s guarantees—with just one write! Forge attestation & enable debug, with 100% success 👥Work with @BenedictSchluet 📄 https://t.co/YhKS2jVQIi
Tweet card summary image
rmpocalypse.github.io
How A Catch-22 Breaks AMD SEV-SNP
0
5
14
@shw3ta_shinde
Shweta Shinde
3 months
🔓 Heracles @acm_ccs'25: Breaking AMD’s Confidential Computing! We show that the hypervisor can read and move hardware-encrypted memory on AMD SEV-SNP. We build a chosen-plaintext oracle to leak kernel memory, auth keys, and cookies from "confidential" VMs https://t.co/upHXpLqSeA
Tweet card summary image
heracles-attack.github.io
Breaking AMDs confidential computing solution using a Chosen Plaintext Attack
0
8
33
@ovahldy
Anjo Vahldiek-Oberwagner
5 months
#SysTEX wrapped up. Thanks to @MariosKogias for making co-chairing fun. Thanks to all the authors, or keynote speaker @shw3ta_shinde and participants. Great to see this friendly community advancing an important security technology for the next years.
1
2
10
@ovahldy
Anjo Vahldiek-Oberwagner
6 months
SysTEX'25 program is out: https://t.co/CpCajnkC9h Including a keynote from Shweta Shinde @shw3ta_shinde , tools to enable CCA research, symbolic validation of enclaves, ML provenance, evaluating trust in TEEs, and many additional topics. Look forward to see you all in Venice!
0
3
5
@confcompsummit
Confidential Computing Summit
7 months
No public Arm CCA hardware? No problem. Learn how #OpenCCA makes CCA research possible on $250 boards, driving open innovation in confidential computing. #CCSummit #ArmCCA @opaquesys @andrinbertschi https://t.co/3h63i156T1
1
3
3
@MariosKogias
Marios Kogias
10 months
It's a great pleasure to co-chair with @ovahldy the 8th edition of SysTEX collocated with @IEEEEUROSP CfP is out: https://t.co/ujtSDKdMyo Deadline: February 20th, 2025 We welcome contributions on the broad spectrum of TEEs. Spread the word and see you all in Venice!
0
5
18
@shw3ta_shinde
Shweta Shinde
1 year
Another milestone in our vision of sovereign smartphone Outstanding Cybersecurity Contribution award at the Cyber Defence Campus 5-year celebration to our team: Friederike Groschupp @Zauney Moritz Schneider @dn0sar @SrdjanCapkun Thanks armasuisse for the support & recognition!
0
1
21
@shw3ta_shinde
Shweta Shinde
1 year
Excited to share our Usenix Security 2025 paper with the #riscv & #ConfidentialComputing community! @Zauney will present Dorami: approach to protect RISC-V security monitors in TEEs like @KeystoneEnclave, joint work with Stavros Volos (Azure). Join us! https://t.co/ajQdK2CVC1
Tweet card summary image
community.riscv.org
Virtual Event - TEE implementations on RISC-V use a security monitor (SM) for enclave isolation, employing privileged ISA instructions for memory protection. The SM, running in machine-mode, shares...
0
2
24
@shw3ta_shinde
Shweta Shinde
1 year
We will present eXpect @ #ICCAD2024, shortlisted for Best Paper Award. Arm AXI protocol connects hardware IPs. We checked whether various implementations enforce security critical properties: signal timing, ordering, bus clearing, etc. Spoiler: they don't! https://t.co/wvEIeCjIOH
axi-security.github.io
1
1
17
@zhendongsu
Zhendong Su
1 year
@CSatETH (@ETH_en) is hiring a tenure-track assistant professor in Theory B: Logic, SMT/SAT, decision procedures, theorem proving, semantics, type systems, etc.; please apply by 15 January 2025! More info at:
0
19
33
@anaklimovic
Ana Klimovic
1 year
📢 We have a faculty opening in @CSatETH Zurich in Systems for Data Science: https://t.co/3vqOa5thtj The position is open-rank (i.e., for an assistant or tenured professor). Feel free to reach out if you have questions. Looking forward to growing the ETH Systems Group! 😃
2
22
66
@shw3ta_shinde
Shweta Shinde
1 year
We will be presenting two papers today at @USENIXSecurity Track 3 Salon E @ 1:30pm @SuprajaSridhara Acai connects Arm CCA confidential VMs to accelerators (eg Nvidia H100) efficiently @BenedictSchluet Heckler, another Ahoi attack, breaks AMD SEV-SNP and Intel TDX with interrupts
0
1
13
@UK_RISE
UKRISE
1 year
Excellent talks on the insecurity of Confidential VMs and mitigations against attacks at the @UK_RISE Summer School by @shw3ta_shinde @ETH_en and @lucawilkeUzL.
0
2
2
@shw3ta_shinde
Shweta Shinde
2 years
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP got the Distinguished Paper award at IEEE #SP24! Blog & artifacts: https://t.co/DelKis7I4B Our talk is on May 22, Wed in Track 2, Ballroom 5 @ 1:25 PM #ahoi Congrats @BenedictSchluet @SuprajaSridhara @andrinbertschi
ahoi-attacks.github.io
Using Malicious #VC Interrupts to Break AMD SEV-SNP
2
6
59
@CHelveticum
Collegium Helveticum
2 years
A highly relevant workshop, organized by our Senior Fellow @nasokan, Associate Fellow @shw3ta_shinde and @kari_kostiainen.
@nasokan
N. Asokan
2 years
Apr 18 @CHelveticum workshop "Real-life impacts of security vulnerabilities" https://t.co/tr0F2fzXeZ featuring @lavados @sirdarckcat Rainer Böhme, Lucas Engl, @sbonhoeffer @hans_gersbach @anders_fogh @kavehrazavi & Mark Brands; organized w/@shw3ta_shinde and @kari_kostiainen
0
2
3
@nasokan
N. Asokan
2 years
Apr 18 @CHelveticum workshop "Real-life impacts of security vulnerabilities" https://t.co/tr0F2fzXeZ featuring @lavados @sirdarckcat Rainer Böhme, Lucas Engl, @sbonhoeffer @hans_gersbach @anders_fogh @kavehrazavi & Mark Brands; organized w/@shw3ta_shinde and @kari_kostiainen
@nasokan
N. Asokan
2 years
(How) can offensive security researchers estimate likely real-world impact of vulnerabilities they discover? I'm organizing a workshop (w/ @shw3ta_shinde and Kari Kostiainen, supported by @CHelveticum) hoping to start a cross-disciplinary conversation. https://t.co/ZI2ID23o8n
1
8
13
@blitzclone
Julian Stecklina
2 years
Regarding #Heckler #ahoi attack on AMD SEV-SNP and Intel TDX: You can trigger the legacy INT 0x80 system call path at will from the "untrusted" hypervisor. 🤡 Someone please shoot the x86 architecture behind the barn. 🤣
1
1
6
@blitzclone
Julian Stecklina
2 years
It seems AMD SEV-SNP is having a security fluctuation. Let's look into the #WeeSee paper! #Ahoi (1/n)
1
3
12
@ETH_en
ETH Zurich
2 years
Computer scientists at ETH Zurich have discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers including AWS and Google. https://t.co/0RMOq0z5lK #CloudSecurity #CloudServices
Tweet card summary image
ethz.ch
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects...
1
13
28